SlideShare a Scribd company logo
Requirement
assessment
201
6
manisha
[Type the companyname]
5/18/2016
[Type text]
Contents
Executive Summary................................................................................................................... 2
Management and Remote Administration................................................................................. 3
Remote Administration.......................................................................................................... 3
Resource Management .......................................................................................................... 3
SLA Management .................................................................................................................. 4
Backup and Data Recovery....................................................................................................... 5
Application resilience............................................................................................................ 5
Backup and disaster recovery ............................................................................................... 5
SLA guidelines for chosen provider.......................................................................................... 6
References ................................................................................................................................. 7
Executive Summary
This report highlights the facts of cloud computing services that an organization needs to
take care while implementing the same to improve their working as well as service quality. These
services can be divided into three categories such as IaaS, PaaS and SaaS and are being used on
a large scale in today’s technical era. This report as well introduces a company with the SLA
guidelines, remote management and resource management that are some vital aspects of cloud
computing services. Knowledge of these aspects helps the organization to deal with the cloud
service provider for example the MICROSOFT. Not only with the important aspects as this
report also includes disaster recovery, backup recovery and appliance resilience of the
MICROSOFT (a chosen service provider for this report). Main motive to discuss its aspects as
well as risks associated with cloud computing services is so that an organization who is planning
to execute such services can understand the concept to use it in an appropriate manner.
[Type text]
Management and Remote Administration
Remote Administration
Organization can utilize remote administration to manage configuration as well as external
IT devices appropriately (Capsasolutions.com, 2016). Developing remote administrator makes it
easy for the organization to manage IT devices associated with cloud. To develop remote
administrator two common portals can be used such as:
1. Administrator Portal: -It used to centralized management for handling the cloud
associated IT resources.
2. Self Service Portal: - It permits clients to choose services they want from a cloud service
provider. It is most like a shopping portal that updates clients with the new assortment of
services being offered by the cloud provider.
A checklist of some requirements needs to be fulfilled:
 It is advisable to the organization using cloud services to perform some terms by their
own such as storing the data virtually and using virtual servers.
[Type text]
 Cloud computing system needs to interoperate with the cloud enabled VIM platform’s
proprietary API that can allow the organization to perform some terms their self.
 Organization needs to ask for some necessary demands such as start, stop, scroll down
and replacing, etc.
Resource Management
Resource management is a core function that affects three basic criteria of the system such
as functionality, performance and cost. Here are some important facts linked with resource
management:
- The methodologies for cloud asset administration connected with the three cloud
conveyance models, Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and
Software as a Service (SaaS), contrast from each other.
- Cloud asset administration requires complex strategies and choices for multi-target
improvement.
- Unified control is unrealistic to give regular administration and assured execution.
- Auto Scaling can be utilized for impromptu spike masses, yet ensure there's a pool of
assets you can discharge or distribute on interest.
[Type text]
SLA Management
Basically, SLA (service-level-agreement) is a contract and a method that introduces with an
assortment available of cloud management products that can offer all the features such as
managing, notifications, data collection and reporting etc (Searchitchannel.techtarget.com, 2016).
SLA agreement is specially required where administrations are sourced from outer gatherings to
ensure adequate administration supply.
Backup and Data Recovery
Let’s us discuss about backup and data recovery keeping in mind the chosen service provider
is the MICROSOFT.
Application resilience
Application resilience used to ensure that the cloud services from the cloud contractor are
being supplied to the cloud client in an efficient manner or without disturbances
(Castsoftware.com, 2016). Checks this term performs are scalability, privacy issues, risks due to
the application failure and better performance.
Backup and disaster recovery
[Type text]
A proper backup and disaster recovery strategy should be provided by the cloud contractor
so that client can prevent the disturbance in their functionality during the downtime or system
failure. Such strategies can help organizations to keep copies of electronic data to use again.
Giving priority to such strategy is important because only it can save an organization from a
huge lose due to their data drop.
Some useful tips for the organizations to keep their data safe while implementing the cloud
computing: -
- Recognize what is vital to keep the business running for instance, email and database
back-up, application access and recuperation time objective.
- Association must move down its data minimum once in a day on a regular basis, yet
ought to emphatically consider more incessant go down or consistent information
insurance if justified (ComputerWeekly, 2016). Because, there is no advantage to making a
move down record of significant information if the data is not being exchanged through a
safe technique.
- A disaster recovery arrangement ought to be seen as a living record that can be
overhauled often when required. The testing period of the arrangement must contain
imperative check exercises to empower the arrangement to face most problematic
occasions.
- Associations need to secure its information and frameworks by introducing general
infection design redesigns as a feature of calamity recuperation arranging, which may
even keep an emergency from happening.
[Type text]
SLA guidelines for chosen provider
Some SLA guidelines are mentioned below to consider while executing the cloud
computing services within the organization:
 Understanding the responsibilities: As a cloud client it is inevitable to have knowledge
of the division of the responsibilities between the service client and the service provider.
Who is in charge of which exercises guarantees that there are no holes which can cause
issues when utilizing cloud administrations.
 Policy assessment: Ignoring the policies mentioned in the agreement same as people
ignore the terms & conditions while making an online account is not safe. Organization
while implementing the cloud services must consider the legal requirements and the
policies carefully (Anon, 2016). Such requirements may include aspects like client
requirements, data protection legislation applicable to the client, laws applicable where
the data placed.
 Difference between service and deployment model: There are critical contrasts in the
levels of cloud asset deliberation, administration level targets, and key execution pointers
that will conceivably be incorporated into a SLA. It additionally represents to that how
regularly the supplier anticipates that their administration will fizzle. Thus, it is required
[Type text]
for a cloud client to know the dangers connected with the administrations, for example,
downtime, poor execution, security breaks and information lose.
 Security and privacy requirements assessment: Security controls in distributed computing
are, generally, the same than security controls in any IT environment. Data and application
procedure are two regular classes that require security and protection thought for
distributed computing. To figure out which level of security is required, an uneven appraisal
of a benefit's affectability and significance is required.
 Pricing: Pricing model may simplify by the service provider, but a total cost of it can be
determined by the services being received from the service provider. Pricing model depends
on several factors such as storage space, monthly traffic as well as the downtime or time
when services were not being used. One can understand its pricing with a suitable equation
given below:
100 * (x-y) / x
Here the “X” is the time measured in minutes in a month when the services were available and
the “Y” is the time of downtime when services were unavailable.
References
ComputerWeekly. (2016). Data backup and recovery tips. [online] Available at:
http://www.computerweekly.com/tip/Data-backup-and-recovery-tips[Accessed22May 2016].
Capsasolutions.com. (2016). Capsa Solutions Mobile Computing Medical Carts & Workstations, FirstDose
Long Term Care Medication Management, Rubbermaid Healthcare Computers. [online] Available at:
http://www.capsasolutions.com/[Accessed22May 2016].
[Type text]
Searchitchannel.techtarget.com. (2016). IT Channel information, news and tips - SearchITChannel.
[online] Available at:http://searchitchannel.techtarget.com/[Accessed22May 2016].
Castsoftware.com. (2016). Analyze and measure application software to control risk and improve
productivity - CAST.[online] Availableat:http://www.castsoftware.com/[Accessed22May 2016].
Anon, (2016). [online] Available at: http://www.cloud-council.org/deliverables/CSCC-Practical-Guide-to-
Cloud-Service-Agreements.pdf[Accessed22May 2016].

More Related Content

PPTX
Ascent overview deck_sep_25_2013
PPT
S299137 Enterprise Saa S Behind The Operational Scenes Of Oracle Crm On Demand
PDF
Bmc atrium
PPTX
IT Services Management
PDF
Algorithm for Scheduling of Dependent Task in Cloud
PDF
Clabby Analytics White Paper: Beyond Virtualization: Building A Long Term Inf...
PDF
Sia Partners Insights when Considering a SaaS Solution
Ascent overview deck_sep_25_2013
S299137 Enterprise Saa S Behind The Operational Scenes Of Oracle Crm On Demand
Bmc atrium
IT Services Management
Algorithm for Scheduling of Dependent Task in Cloud
Clabby Analytics White Paper: Beyond Virtualization: Building A Long Term Inf...
Sia Partners Insights when Considering a SaaS Solution

What's hot (19)

PDF
Citrix Cloud Services: Total Economic Benefits Assessment Guide
PDF
Dynamic Service Level Agreement Verification in Cloud Computing
PPTX
Service Management Practice
DOC
Private cloud reference model ms
PDF
Robert McFarlane deconstructs DCIM tools' role in the enterprise
DOCX
Crm notes 21.12.2011
PDF
PDF
Cloudonomics: The Economics of Cloud Computing
PDF
Dit yvol5iss36
PDF
Software and Information Technology Glossary of Terms
PDF
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
PPT
Virtualization and Automation: How Dynamic is Your Data Center
DOCX
Network administration and support
PDF
IRJET- Cloud Computing: Security Issues Challenges and Solution
PDF
20150113
PPTX
TechDays 2010 Portugal - Event Driven Architectures - 16x9
PPTX
Why Data Quality is Key To Solvency II
PDF
Data centerconsolidations
PDF
Configuration inerpsaas multi tenancy
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Dynamic Service Level Agreement Verification in Cloud Computing
Service Management Practice
Private cloud reference model ms
Robert McFarlane deconstructs DCIM tools' role in the enterprise
Crm notes 21.12.2011
Cloudonomics: The Economics of Cloud Computing
Dit yvol5iss36
Software and Information Technology Glossary of Terms
Martin Chamambo - High Level Design-SDN BASED OPENSTACK IMPLEMENTATION IN ZIM...
Virtualization and Automation: How Dynamic is Your Data Center
Network administration and support
IRJET- Cloud Computing: Security Issues Challenges and Solution
20150113
TechDays 2010 Portugal - Event Driven Architectures - 16x9
Why Data Quality is Key To Solvency II
Data centerconsolidations
Configuration inerpsaas multi tenancy
Ad

Viewers also liked (14)

PDF
GENDHIS GANTARI PORTFOLIO
PDF
Catalogue des formations Factea Institute
PDF
WORLD INVESTMENT REPORT 2010: INVESTING IN A LOW-CARBON ECONOMY - OVERVIEW
DOCX
Compare and contrast conflict visions in healthcare
DOCX
O príncipe das emojis
DOCX
Complex problem Assignment Help
PDF
Présentation OSKO 2016
PPT
Treball de català
PDF
show 2014
PPTX
Tarea del seminario 2
DOC
Power Newsletter 03-2015 3rd draft
PDF
OLSC brochure updated 10AUG15
PDF
BLE_Indoor_Report
GENDHIS GANTARI PORTFOLIO
Catalogue des formations Factea Institute
WORLD INVESTMENT REPORT 2010: INVESTING IN A LOW-CARBON ECONOMY - OVERVIEW
Compare and contrast conflict visions in healthcare
O príncipe das emojis
Complex problem Assignment Help
Présentation OSKO 2016
Treball de català
show 2014
Tarea del seminario 2
Power Newsletter 03-2015 3rd draft
OLSC brochure updated 10AUG15
BLE_Indoor_Report
Ad

Similar to Cloud comuting Cheap Assignment Help (20)

DOCX
Cloud computing set 3
PDF
Various Security Issues and their Remedies in Cloud Computing
PPTX
40369A Microsoft Cloud Fundamentals - Chapter 1
PDF
10 security concerns cloud computing
PDF
Design and implement a new cloud security method based on multi clouds on ope...
PDF
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
PDF
IBM Point of View: Security and Cloud Computing
PDF
IBM Point of view -- Security and Cloud Computing (Tivoli)
PDF
Requirements and Challenges for Securing Cloud Applications and Services
PDF
Cloud Computing - A future prerogative
PDF
Cloud computing understanding security risk and management
PDF
Security issues in cloud computing for msmes
PDF
Security issues in cloud computing for msmes
PDF
Security issues in cloud computing for msmes
PDF
Security issues in cloud computing for msmes
PDF
Cloud Computing in Resource Management
PDF
An Efficient MDC based Set Partitioned Embedded Block Image Coding
PDF
ETCA_5
PPTX
Executive Briefing: Strategic Issues Surrounding Cloud Services
PDF
G0314043
Cloud computing set 3
Various Security Issues and their Remedies in Cloud Computing
40369A Microsoft Cloud Fundamentals - Chapter 1
10 security concerns cloud computing
Design and implement a new cloud security method based on multi clouds on ope...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
IBM Point of View: Security and Cloud Computing
IBM Point of view -- Security and Cloud Computing (Tivoli)
Requirements and Challenges for Securing Cloud Applications and Services
Cloud Computing - A future prerogative
Cloud computing understanding security risk and management
Security issues in cloud computing for msmes
Security issues in cloud computing for msmes
Security issues in cloud computing for msmes
Security issues in cloud computing for msmes
Cloud Computing in Resource Management
An Efficient MDC based Set Partitioned Embedded Block Image Coding
ETCA_5
Executive Briefing: Strategic Issues Surrounding Cloud Services
G0314043

More from Nicole Valerio (20)

DOCX
Pharma cokinetics of drugs assignment help
DOCX
Oscola formatted essay|Cheap Assignment Help
DOCX
Research proposal sample|cheapassignmenthelp.com
DOCX
Factors affecting customer loyalty in telecom sector in india
DOCX
Assignment premier academic writing agency with industry
DOC
One ocean rubric at 1 bibliography
DOC
One ocean rubric at 1 bibliography 170305(1)
DOCX
Bsbrsk501 manage risk_project_1_template
DOCX
FACULTY OF INFORMATION TECHNOLOGY
DOCX
Change Management Assignment Help|25% Off Online Assignment Help
DOCX
Dissertation Cheap Assignment Help
DOCX
Change Management Assignment Help|25% Off Online Assignment Help
DOCX
Dissertation chapter1 and chapter 4 sample
DOCX
Sample 3 bipolar on female adult population
DOCX
Dissertation chapter1 and chapter 4 sample
DOCX
Dissertation Cheap Assignment Help
DOCX
Cheap assessment Help|USA Assignment Help
DOCX
Development of a science learning and teaching unit
DOCX
Developing ics cyber security improvement plan(5)
DOCX
Motivation For DSMS Assignment Help
Pharma cokinetics of drugs assignment help
Oscola formatted essay|Cheap Assignment Help
Research proposal sample|cheapassignmenthelp.com
Factors affecting customer loyalty in telecom sector in india
Assignment premier academic writing agency with industry
One ocean rubric at 1 bibliography
One ocean rubric at 1 bibliography 170305(1)
Bsbrsk501 manage risk_project_1_template
FACULTY OF INFORMATION TECHNOLOGY
Change Management Assignment Help|25% Off Online Assignment Help
Dissertation Cheap Assignment Help
Change Management Assignment Help|25% Off Online Assignment Help
Dissertation chapter1 and chapter 4 sample
Sample 3 bipolar on female adult population
Dissertation chapter1 and chapter 4 sample
Dissertation Cheap Assignment Help
Cheap assessment Help|USA Assignment Help
Development of a science learning and teaching unit
Developing ics cyber security improvement plan(5)
Motivation For DSMS Assignment Help

Recently uploaded (20)

PPT
Data mining for business intelligence ch04 sharda
PDF
A Brief Introduction About Julia Allison
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PPTX
HR Introduction Slide (1).pptx on hr intro
DOCX
Business Management - unit 1 and 2
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
Training And Development of Employee .pdf
PDF
How to Get Business Funding for Small Business Fast
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PPTX
Lecture (1)-Introduction.pptx business communication
Data mining for business intelligence ch04 sharda
A Brief Introduction About Julia Allison
DOC-20250806-WA0002._20250806_112011_0000.pdf
HR Introduction Slide (1).pptx on hr intro
Business Management - unit 1 and 2
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
ICG2025_ICG 6th steering committee 30-8-24.pptx
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
Unit 1 Cost Accounting - Cost sheet
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Reconciliation AND MEMORANDUM RECONCILATION
Training And Development of Employee .pdf
How to Get Business Funding for Small Business Fast
Ôn tập tiếng anh trong kinh doanh nâng cao
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
unit 1 COST ACCOUNTING AND COST SHEET
Lecture (1)-Introduction.pptx business communication

Cloud comuting Cheap Assignment Help

  • 2. [Type text] Contents Executive Summary................................................................................................................... 2 Management and Remote Administration................................................................................. 3 Remote Administration.......................................................................................................... 3 Resource Management .......................................................................................................... 3 SLA Management .................................................................................................................. 4 Backup and Data Recovery....................................................................................................... 5 Application resilience............................................................................................................ 5 Backup and disaster recovery ............................................................................................... 5 SLA guidelines for chosen provider.......................................................................................... 6 References ................................................................................................................................. 7 Executive Summary This report highlights the facts of cloud computing services that an organization needs to take care while implementing the same to improve their working as well as service quality. These services can be divided into three categories such as IaaS, PaaS and SaaS and are being used on a large scale in today’s technical era. This report as well introduces a company with the SLA guidelines, remote management and resource management that are some vital aspects of cloud computing services. Knowledge of these aspects helps the organization to deal with the cloud service provider for example the MICROSOFT. Not only with the important aspects as this report also includes disaster recovery, backup recovery and appliance resilience of the MICROSOFT (a chosen service provider for this report). Main motive to discuss its aspects as well as risks associated with cloud computing services is so that an organization who is planning to execute such services can understand the concept to use it in an appropriate manner.
  • 3. [Type text] Management and Remote Administration Remote Administration Organization can utilize remote administration to manage configuration as well as external IT devices appropriately (Capsasolutions.com, 2016). Developing remote administrator makes it easy for the organization to manage IT devices associated with cloud. To develop remote administrator two common portals can be used such as: 1. Administrator Portal: -It used to centralized management for handling the cloud associated IT resources. 2. Self Service Portal: - It permits clients to choose services they want from a cloud service provider. It is most like a shopping portal that updates clients with the new assortment of services being offered by the cloud provider. A checklist of some requirements needs to be fulfilled:  It is advisable to the organization using cloud services to perform some terms by their own such as storing the data virtually and using virtual servers.
  • 4. [Type text]  Cloud computing system needs to interoperate with the cloud enabled VIM platform’s proprietary API that can allow the organization to perform some terms their self.  Organization needs to ask for some necessary demands such as start, stop, scroll down and replacing, etc. Resource Management Resource management is a core function that affects three basic criteria of the system such as functionality, performance and cost. Here are some important facts linked with resource management: - The methodologies for cloud asset administration connected with the three cloud conveyance models, Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), contrast from each other. - Cloud asset administration requires complex strategies and choices for multi-target improvement. - Unified control is unrealistic to give regular administration and assured execution. - Auto Scaling can be utilized for impromptu spike masses, yet ensure there's a pool of assets you can discharge or distribute on interest.
  • 5. [Type text] SLA Management Basically, SLA (service-level-agreement) is a contract and a method that introduces with an assortment available of cloud management products that can offer all the features such as managing, notifications, data collection and reporting etc (Searchitchannel.techtarget.com, 2016). SLA agreement is specially required where administrations are sourced from outer gatherings to ensure adequate administration supply. Backup and Data Recovery Let’s us discuss about backup and data recovery keeping in mind the chosen service provider is the MICROSOFT. Application resilience Application resilience used to ensure that the cloud services from the cloud contractor are being supplied to the cloud client in an efficient manner or without disturbances (Castsoftware.com, 2016). Checks this term performs are scalability, privacy issues, risks due to the application failure and better performance. Backup and disaster recovery
  • 6. [Type text] A proper backup and disaster recovery strategy should be provided by the cloud contractor so that client can prevent the disturbance in their functionality during the downtime or system failure. Such strategies can help organizations to keep copies of electronic data to use again. Giving priority to such strategy is important because only it can save an organization from a huge lose due to their data drop. Some useful tips for the organizations to keep their data safe while implementing the cloud computing: - - Recognize what is vital to keep the business running for instance, email and database back-up, application access and recuperation time objective. - Association must move down its data minimum once in a day on a regular basis, yet ought to emphatically consider more incessant go down or consistent information insurance if justified (ComputerWeekly, 2016). Because, there is no advantage to making a move down record of significant information if the data is not being exchanged through a safe technique. - A disaster recovery arrangement ought to be seen as a living record that can be overhauled often when required. The testing period of the arrangement must contain imperative check exercises to empower the arrangement to face most problematic occasions. - Associations need to secure its information and frameworks by introducing general infection design redesigns as a feature of calamity recuperation arranging, which may even keep an emergency from happening.
  • 7. [Type text] SLA guidelines for chosen provider Some SLA guidelines are mentioned below to consider while executing the cloud computing services within the organization:  Understanding the responsibilities: As a cloud client it is inevitable to have knowledge of the division of the responsibilities between the service client and the service provider. Who is in charge of which exercises guarantees that there are no holes which can cause issues when utilizing cloud administrations.  Policy assessment: Ignoring the policies mentioned in the agreement same as people ignore the terms & conditions while making an online account is not safe. Organization while implementing the cloud services must consider the legal requirements and the policies carefully (Anon, 2016). Such requirements may include aspects like client requirements, data protection legislation applicable to the client, laws applicable where the data placed.  Difference between service and deployment model: There are critical contrasts in the levels of cloud asset deliberation, administration level targets, and key execution pointers that will conceivably be incorporated into a SLA. It additionally represents to that how regularly the supplier anticipates that their administration will fizzle. Thus, it is required
  • 8. [Type text] for a cloud client to know the dangers connected with the administrations, for example, downtime, poor execution, security breaks and information lose.  Security and privacy requirements assessment: Security controls in distributed computing are, generally, the same than security controls in any IT environment. Data and application procedure are two regular classes that require security and protection thought for distributed computing. To figure out which level of security is required, an uneven appraisal of a benefit's affectability and significance is required.  Pricing: Pricing model may simplify by the service provider, but a total cost of it can be determined by the services being received from the service provider. Pricing model depends on several factors such as storage space, monthly traffic as well as the downtime or time when services were not being used. One can understand its pricing with a suitable equation given below: 100 * (x-y) / x Here the “X” is the time measured in minutes in a month when the services were available and the “Y” is the time of downtime when services were unavailable. References ComputerWeekly. (2016). Data backup and recovery tips. [online] Available at: http://www.computerweekly.com/tip/Data-backup-and-recovery-tips[Accessed22May 2016]. Capsasolutions.com. (2016). Capsa Solutions Mobile Computing Medical Carts & Workstations, FirstDose Long Term Care Medication Management, Rubbermaid Healthcare Computers. [online] Available at: http://www.capsasolutions.com/[Accessed22May 2016].
  • 9. [Type text] Searchitchannel.techtarget.com. (2016). IT Channel information, news and tips - SearchITChannel. [online] Available at:http://searchitchannel.techtarget.com/[Accessed22May 2016]. Castsoftware.com. (2016). Analyze and measure application software to control risk and improve productivity - CAST.[online] Availableat:http://www.castsoftware.com/[Accessed22May 2016]. Anon, (2016). [online] Available at: http://www.cloud-council.org/deliverables/CSCC-Practical-Guide-to- Cloud-Service-Agreements.pdf[Accessed22May 2016].